May 13, 2017 President Trump issued two days ago a much anticipated executive order that reflects mature thinking about managing the sprawling kluge of federal networks, a determination to do it, and an over-estimation of the government’s ability to comply with demands for 16 Cabinet-level reports in short order. Whether the order is rigorously implemented [...]

Company data security practices will now be measured against a legally enforceable standard of care. The National Institute for Standards and Technology (NIST) began creating the groundwork for this standard in 2002,[1] the Third Circuit announced its arrival last year in Wyndham Hotels[2], and the Federal Trade Commission (FTC or Commission) told you last month [...]

If you follow cyber conflict issues, you’ll want to see this correspondence from International Security, Vol. 40, No. 1 (Summer 2015), pp. 191–195: In “The Impact of China on Cybersecurity: Fiction and Friction,” Jon Lindsay asserts that the threat of Chinese cyber operations, though “relentlessly irritating,” is greatly exaggerated; that China has more to fear from [...]